4.7 Article

Key-policy attribute-based encryption against continual auxiliary input leakage

Journal

INFORMATION SCIENCES
Volume 470, Issue -, Pages 175-188

Publisher

ELSEVIER SCIENCE INC
DOI: 10.1016/j.ins.2018.07.077

Keywords

Key-policy attribute-based encryption; Continual auxiliary input leakage; Dual system encryption; Static assumptions

Funding

  1. National Natural Science Foundation of China [U1736112, 61772009, 61672207]
  2. Jiangsu Provincial Natural Science Foundation of China [BK20161511]
  3. Fundamental Research Funds for the Central Universities [2016B10114]
  4. Jiangsu Key Laboratory of Big Data Security & Intelligent Processing, NJUPT
  5. Natural Science Foundation of the Jiangsu Higher Education Institutions of China [17KJB520042]
  6. Suqian College Outstanding Young Backbone Teachers Program
  7. Foundation of Suqian college [2016KY04]
  8. Qing Lan Project, Anhui University of Natural Science Research Project [KJ2018A0398]

Ask authors/readers for more resources

Attribute-based encryption mechanism can achieve very flexible access control, so it has a wide range of applications in the distributed environment, such as fine-grained access control, audit log applications, cloud storage systems. Key-policy attribute-based encryption (KP-ABE) scheme is especially suitable for video on demand, pay TV, etc. Most of the existing KP-ABE schemes do not consider the side channel attacks which probably leak some secret information about the cryptosystems. In the paper, we present the formal definition and security model of key-policy attribute-based encryption scheme which is resilient to continual auxiliary input (CAI) leakage. What is more, we present a concrete KP-ABE scheme. The proposed scheme is proved secure under the static assumptions. (C) 2018 Elsevier Inc. All rights reserved.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available